Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp802299ybl; Wed, 4 Dec 2019 11:08:08 -0800 (PST) X-Google-Smtp-Source: APXvYqwornNXAg8dYHPSVISbTBtDmFsQtXl3mMkQQt6BdG6BO1XZTPqrybu7jYNVx6+lcVoMaOCP X-Received: by 2002:a9d:19ed:: with SMTP id k100mr3779261otk.297.1575486488406; Wed, 04 Dec 2019 11:08:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575486488; cv=none; d=google.com; s=arc-20160816; b=B02bk1hdsdchk4hMwa4E6IbMIm20BTeBeH7XxkbCxPsqJMdOIJHeA4gMF6Uc9y2m8r d2hZWpjZlJvxOh7E65FyBnowFezZhiL9HK8ann5zWxoZpsZeaR42NV5rNRM/l9BLgPew 3vdo0mJSYzoJFRVMVZqRQDWk+N4mySINwCcc4QE4tklYLLv2LHkFd3+e33kWwnaY8PDU lLtYfogCCncSVO5QChc0Zawt0UX/alzzwOLqaLkNwhEKZiqFfO8L7ZtbXPf9TUyK7tBw OECM1vAlKhzYKz67N2vChfxXGxcjwc2eH3y92QEMJLBYb5/MlrXnKRwL+545uCFlfQqB 5dJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EJ4BhwcaMjPDbAB1X6VC+u9gPoejTEj++3mZhE7qrl8=; b=Bf+Sz/NDbIAKgWfCQ82WcJebasVfzcn0D1QprGIApuPON42zX6iZvwAUv3O3Wjghyy nQLonBRbZ/9PoQn70CjzvM9ysWuwQiJZllL3CiSnQqmrJ27Tl/ffZfFjAh84hwn+jane DsEbVUC085fyNQX/qSgVvEHvDv/Z5/8jRPCYMDo1q71c9FzgtQexGutb1Emd0M7EZlKZ zfdvoXOsxfFqE0tdqBjAIACrmKU8/TYQYmobmbJFhUIEO228BUjEKrX1vG+dokS/lufz qU2G0hWXfHEQPzgX+JwoQ/9XrOxFCL/lcRGyXlgVy2C0Z0TrbSecD8RhHX3vaTfB3Rjk AZfw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vScGI9iu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k23si3916586otp.181.2019.12.04.11.07.55; Wed, 04 Dec 2019 11:08:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vScGI9iu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730363AbfLDSFX (ORCPT + 99 others); Wed, 4 Dec 2019 13:05:23 -0500 Received: from mail.kernel.org ([198.145.29.99]:51844 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730348AbfLDSFU (ORCPT ); Wed, 4 Dec 2019 13:05:20 -0500 Received: from localhost (unknown [217.68.49.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BA0132081B; Wed, 4 Dec 2019 18:05:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575482720; bh=1P+JhWcNEDUHQp8AcPsVmL+tkyIZYHZtGb1E3NhEtE4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vScGI9iu4qNZEBoTDtUbxqO4YIgXxjB8EfxZd0Ec42i2LSJsttd9FlhE4nPizMxiZ DDYIrBLF1MuFddtv+aSnoY3/9RhtIBBNrvCA4CEnE4vPmkklU8isz5StKqlX9Tnxc2 9cLup/zaWhTYih6WMTHbIGdd0aYxGrHh6kETIsqo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Aditya Pakki , "David S. Miller" , Sasha Levin Subject: [PATCH 4.14 109/209] net/netlink_compat: Fix a missing check of nla_parse_nested Date: Wed, 4 Dec 2019 18:55:21 +0100 Message-Id: <20191204175329.445140914@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191204175321.609072813@linuxfoundation.org> References: <20191204175321.609072813@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Aditya Pakki [ Upstream commit 89dfd0083751d00d5d7ead36f6d8b045bf89c5e1 ] In tipc_nl_compat_sk_dump(), if nla_parse_nested() fails, it could return an error. To be consistent with other invocations of the function call, on error, the fix passes the return value upstream. Signed-off-by: Aditya Pakki Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/tipc/netlink_compat.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/net/tipc/netlink_compat.c b/net/tipc/netlink_compat.c index ad4dcc663c6de..1c8ac0c11008c 100644 --- a/net/tipc/netlink_compat.c +++ b/net/tipc/netlink_compat.c @@ -1021,8 +1021,11 @@ static int tipc_nl_compat_sk_dump(struct tipc_nl_compat_msg *msg, u32 node; struct nlattr *con[TIPC_NLA_CON_MAX + 1]; - nla_parse_nested(con, TIPC_NLA_CON_MAX, - sock[TIPC_NLA_SOCK_CON], NULL, NULL); + err = nla_parse_nested(con, TIPC_NLA_CON_MAX, + sock[TIPC_NLA_SOCK_CON], NULL, NULL); + + if (err) + return err; node = nla_get_u32(con[TIPC_NLA_CON_NODE]); tipc_tlv_sprintf(msg->rep, " connected to <%u.%u.%u:%u>", -- 2.20.1